Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on DevOps, CI/CD, Automation and related technologies.

Protecting Production from a VP

The rise of AI coding assistants means new "developers" in many organizations. Your safety nets (and on ramps) need to be built with citizen developers in mind. Innovation is moving faster than ever. That’s great. With AI code generation accelerating professional developers and the rise of "citizen developers" thanks to tools like vibe-coding, we’re seeing more code written today than ever before.

Troubleshoot Faster with the New Log Search and Filtering in Qovery Observe

Following the launch of Qovery Observe, we’re progressively adding new capabilities to help you better monitor, debug, and understand your applications. Today, we’re excited to announce a major improvement to the Logs experience: you can now search and filter directly within your application logs.

Your "Technical Debt" is a LIE! Meet QA Debt.

The REAL reason your system WILL FAIL. We all talk about technical debt, but QA Debt is the silent killer costing companies millions. It's the accumulation of skipped regression checks, outdated test suites, and ignored production data. The result? Unpredictable, catastrophic outages that can sink your business (and your career!). Learn how to identify and pay down your QA Debt before it's too late. It's not about testing more it's about testing SMARTER.

Tech Talk #10 Building a VictoriaMetrics PaaS: Setting up Metrics, Logs, and Traces

From Blueprint to Reality This episode is designed to be a practical, step-by-step guide. We will show you how to leverage the VictoriaMetrics Kubernetes Stack—our "easier button"—to simplify the deployment process and get your components running quickly.

Kubernetes Security Guide: Risks, Strategies, And Tools

In 2018, attackers gained access to Tesla’s AWS cloud environment through an unprotected Kubernetes console (admin console). Because it lacked proper authentication, the hackers could see and control cluster resources. Once inside, they deployed new pods running cryptocurrency mining software, using Tesla’s compute power for profit. During the breach, the attackers also uncovered credentials stored in the cluster.

Onboarding Microsoft Sentinel data lake with DataStream

Modern security operations teams face an overwhelming challenge: a rapidly growing volume of logs, alerts, and telemetry from cloud services, on-premises infrastructure, and third-party security tools. Traditional SIEM platforms often struggle to scale cost-effectively and provide the agility needed for advanced analytics and threat hunting.

7 Ways Your Incident Management Just Got a Boost (New Feature Rundown)

All the things you may have missed that will make your incident management smarter, faster, and simply easier. We ship updates every week because we want you to get the most out of FireHydrant. But we also know it's hard to stay up to date and read every week's changelog (even though we know reading changelogs is the highlight of your week ).

Experimenting With Different Scripts

It all began when I spun up an AWS t4g.small burstable instance for a side project. Nothing unusual just another day in the cloud. But the moment I connected through SSH, something caught my eye. The system greeted me with a temperature reading of -273.5°C. Wait… what? That’s 0 Kelvin, the point where atomic motion completely stops. In other words, absolute zero , a state that’s theoretically impossible for anything to operate in.